The repository contains C programs that demonstrates stack smashing using the exploit exercises protostar live cd. The exploit2.c is able to exploit stack0, stack3, stack4 and stack5 from the protostar exercises to gain root shell using a shellcode. exploit.c is able to do the same but is not automated.
There is a perl script for extracting machine instructions from objdump, a nasm shellcode and 2 other C programs.
The code here are provided and to be used for educational purpose only. To help IT professionals understand vulnerabilities better in order to better defend their systems. Computer misuse is a serious crime in Singapore and other countries, punishable by law.
Refer to the following for a detailed article on Buffer overflow and Stack smashing, using the protostar exercises.
https://www.nighthour.sg/articles/2017/explore-buffer-overflow-stack-smashing.html
The protostar live cd is available from
https://exploit-exercises.com/
Gpg Signed commits are used for committing the source files.
Look at the repository commits tab for the verified label for each commit.
A userful link on how to verify gpg signature in https://github.com/blog/2144-gpg-signature-verification